Information Security Policy

Information Security Policy

  1. Purpose: To protect the confidentiality, integrity, and availability of data through managing risks related to information security.

  2. Scope: Applies to all employees, contractors, and third-party service providers with access to our information systems and data.

  3. Responsibilities:

    • Employees are required to adhere to this policy and related procedures.

    • Security Team oversees the implementation of security measures and compliance.

    • Data Protection Officer (DPO) ensures adherence to data protection laws.

  4. Data Protection:

    • Personal data processing in alignment with GDPR.

    • Regular training on data protection legislations for staff.

  5. Incident Management:

    • Established process for managing and reporting security incidents.

    • Regular updates and training on incident response protocols.

  6. Data Retention and Destruction:

    • Defined schedules for retention and secure destruction of data.

  7. Access Control:

    • Use of multi-factor authentication.

    • Comprehensive password policy.

  8. Risk Management:

    • Continuous assessment and mitigation of security risks.

  9. Compliance:

    • Regular review by third parties to ensure compliance with security policies.

    • Subject Access Request procedure in place for data access and management.

  10. Review and Update:

    • Periodic review and update of the security policy to reflect changes in technology, threats, and legal requirements.

This policy is a living document and will be reviewed regularly to ensure ongoing compliance and security of data assets.